IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Web Access Control

RSS Feed    Add to Google    Add to My Yahoo!
Web Access Control Reports
 
How to Mitigate the Risk of Insider Threats
sponsored by Digital Guardian
WHITE PAPER: This white paper explains how to successfully ward off insider threats by altering the operating environment.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

Digital Guardian

Outsmarting Hackers: Why You Need Both Strong and Risk-Based Authentication
sponsored by CA Technologies.
WHITE PAPER: This white paper presents a layered IAM security approach incorporating both strong authentication and risk-based authentication.
Posted: 12 Jun 2015 | Published: 11 Dec 2014

CA Technologies.

Going Beyond Basic IAM: Protecting Identities with a Risk-Based Approach
sponsored by HID
VIDEO: This brief video explores two-factor authentication(2FA) to enhance IAM strategies.
Posted: 12 Jun 2015 | Premiered: 31 May 2013

HID

5 Pillars of API Management with CA Technologies
sponsored by CA Technologies.
WHITE PAPER: View this white paper to learn about each of the 5 pillars API management.
Posted: 10 Jun 2015 | Published: 31 Dec 2014

CA Technologies.

Migrate Without Pain: Replace Your Aging LDAP Infrastructure
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper introducesĀ a method for migrating away from LDAP that's easy, efficient, and risk-free.
Posted: 16 Mar 2015 | Published: 16 Mar 2015

Radiant Logic, Inc.

Cloud Sherpas Collaboration Assessment
sponsored by Cloud Sherpas
WHITE PAPER: This white paper explains how Collaboration Assessment can prioritize your initiatives and define specific solutions. Read now to eliminate uncertainty and maximize the value you get from Google's collaboration capabilities.
Posted: 12 Jun 2015 | Published: 12 Jun 2015

Cloud Sherpas

Enabling Your Mobile Workforce with Secure Mobile Content Collaboration
sponsored by Box
WHITE PAPER: This white paper explores the leading mobile security strategies in use today to secure the enterprise network.
Posted: 26 Jun 2015 | Published: 17 Jun 2015

Box

Combating Password Sharing and Misuse with IAM
sponsored by SailPoint Technologies
EGUIDE: In this expert eguide, explore the staggering statistics of irresponsible password use and how IAM can save your organization from being in the next breach headline.
Posted: 06 Apr 2015 | Published: 11 Mar 2015

SailPoint Technologies

Data Governance Risk: Know Who Has Your Data
sponsored by RSA
RESOURCE: Did you know that 76% of organizations find it challenging to control access to sensitive data? Access this brief infographic to gain a better understanding of common data governance challenges and the dire consequences if they are not addressed.
Posted: 08 May 2015 | Published: 24 Feb 2015

RSA

Defending Against Advanced Threats at the Identity Perimeter
sponsored by SecureAuth
WHITE PAPER: This white paper explores how identity has become the new perimeter and the challenges that lie ahead.
Posted: 17 Jun 2015 | Published: 27 May 2015

SecureAuth
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement